Results 71 to 80 of about 429,644 (328)

Research on Security of Virtualization on Cloud Computing

open access: yesDianxin kexue, 2015
In recent years,followed by developing and popularizing of cloud computing service,the security problems appear. One of the problems,virtualization security,draws most attention of cloud services providers and security manufacturers.
Xiaodi Wang   +4 more
doaj   +2 more sources

Halogen Bonding‐Enabled Stabilization of Copper(I) Cluster Scintillators in Aqueous Environments

open access: yesAdvanced Optical Materials, EarlyView.
A new class of halogen bonding‐strengthened copper(I) cluster‐based X‐ray scintillators is developed, with higher lattice symmetry, reduced trap density, and enhanced stability in polar chemical environments surpassing the performance of halogen‐free counterparts and other conventional scintillators. Abstract Scintillators are essential in applications,
Chang Gu   +3 more
wiley   +1 more source

Security Pattern for Cloud SaaS: From System and Data Security to Privacy Case Study in AWS and Azure

open access: yesComputers, 2019
The Cloud is fast becoming a popular platform for SaaS, a popular software delivery model. This is because the Cloud has many advantages over the traditional private infrastructure, such as increased flexibility, no maintenance, less management burden ...
Annanda Rath   +3 more
doaj   +1 more source

Security and Privacy Issues in Cloud Computing [PDF]

open access: yes, 2016
Cloud computing transforming the way of information technology (IT) for consuming and managing, promising improving cost efficiencies, accelerate innovations, faster time-to-market and the ability to scale applications on demand (Leighton, 2009 ...
Ismail, H., Khan, M., Medvedev, M.
core  

Research Progress on Atmospheric Turbulence Perception and Correction Based on Adaptive Optics and Deep Learning

open access: yesAdvanced Photonics Research, EarlyView.
This work presents a systematic review of atmospheric turbulence fundamentals, including theoretical formulations and adaptive optics‐based mitigation strategies. This includes an in‐depth examination of the devices, theories, and methodologies associated with traditional correction approaches.
Qinghui Liu   +5 more
wiley   +1 more source

AN QUALITY BASED ENHANCEMENT OF USER DATA PROTECTION VIA FUZZY RULE BASED SYSTEMS IN CLOUD ENVIRONMENT [PDF]

open access: yesICTACT Journal on Soft Computing, 2016
So far, in cloud computing distinct customer is accessed and consumed enormous amount of services through web, offered by cloud service provider (CSP). However cloud is providing one of the services is, security-as-a-service to its clients, still people ...
R Poorva Devi, S Rajalakshmi
doaj  

Vision‐Assisted Avocado Harvesting with Aerial Bimanual Manipulation

open access: yesAdvanced Robotics Research, EarlyView.
This work outlines the design and implementation of a bimanual aerial robot that employs visual perception and learning to detect, reach, and harvest avocados. A new gripper and fixer arm assembly is used to harvest avocados, while visual perception enables the detection of avocados and estimation of their position and orientation for determining ...
Zhichao Liu   +3 more
wiley   +1 more source

Cloud Security Metrics and Measurement

open access: yesJournal of Knowledge Learning and Science Technology ISSN: 2959-6386 (online), 2023
This research aims to investigate the cloud security metrics by exploring the existing frameworks, integrated approaches and quantitative measurements to enhance overall security in cloud environments. This study explains several established frameworks and standards, such as the CSA Cloud Controls Matrix, NIST SP 800-53 and ISO/IEC 27001, which are ...
openaire   +2 more sources

In‐Hand Singulation, Scooping, and Cable Untangling with a 5‐Dof Tactile‐Reactive Gripper

open access: yesAdvanced Robotics Research, EarlyView.
This article presents a two‐fingered gripper with five degrees of freedom and a vision‐based tactile sensor for dexterous in‐hand manipulation. It performs complex tasks such as object singulation within granular media, scooping and precise card insertion, and cable untangling.
Yuhao Zhou   +3 more
wiley   +1 more source

Enhancing Cloud-Based IoT Security Through Trustworthy Cloud Service: An Integration of Security and Reputation Approach

open access: yesIEEE Access, 2019
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous and distributed systems, and it has increasingly become a ubiquitous computing service platform.
Xiang Li   +5 more
doaj   +1 more source

Home - About - Disclaimer - Privacy